Description
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
Remediation
References
https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation
https://github.com/NetEase/pomelo/issues/1149
Related Vulnerabilities
CVE-2020-6459 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-2172 Vulnerability in maven package org.jenkins-ci.plugins:code-coverage-api
CVE-2016-10538 Vulnerability in npm package cli
CVE-2020-7772 Vulnerability in npm package doc-path
CVE-2021-46708 Vulnerability in maven package org.webjars.bower:swagger-ui